ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 194 - SY0-701 discussion

Report
Export

Which of the following is most likely to be deployed to obtain and analyze attacker activity and techniques?

A.
Firewall
Answers
A.
Firewall
B.
IDS
Answers
B.
IDS
C.
Honeypot
Answers
C.
Honeypot
D.
Layer 3 switch
Answers
D.
Layer 3 switch
Suggested answer: C

Explanation:

A honeypot is most likely to be deployed to obtain and analyze attacker activity and techniques. A honeypot is a decoy system set up to attract attackers, providing an opportunity to study their methods and behaviors in a controlled environment without risking actual systems.

Honeypot: A decoy system designed to lure attackers, allowing administrators to observe and analyze attack patterns and techniques.

Firewall: Primarily used to block unauthorized access to networks, not for observing attacker behavior.

IDS (Intrusion Detection System): Detects and alerts on malicious activity but does not specifically engage attackers to observe their behavior.

Layer 3 switch: Used for routing traffic within networks, not for analyzing attacker techniques.

asked 02/10/2024
Yan Nguyen
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first